Solved

Remove NTFS Security Referring to Other Account From All Folders and Subfolders

Posted on 2004-10-19
3
197 Views
Last Modified: 2013-12-04
Here it is:
I am running on W2K SP4,

I was using my computer out of domain, that time I denied access to Everyone account but not only to Administrator.
After that my computer was switched to our corporate domain. I didnt like it there, all that restrictions :) And I am using various programs and I should configure ISA etc.. to use normally. So I switched from domain off. Now even when I connect to my own computer I cannot delete change remove those files which I have denied to everyone's access. But manually I can take ownership and then grant to everyone etc.. But that would take hours to change all files because I cannot chage it all from root folder.

Any suggestions?
Thanx in advance.
0
Comment
Question by:masirof
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 20

Accepted Solution

by:
Debsyl99 earned 250 total points
ID: 12349595
Hi

Could you not reset permissions and then use the checkbox "enable security to propagate to all sub-files and folders" - This will reset the whole lot however so beware...

Deb :))
0
 
LVL 6

Author Comment

by:masirof
ID: 12349691
Sorry :(
0
 
LVL 20

Expert Comment

by:Debsyl99
ID: 12350096
lol - never apologise that's why we're here - just glad to help!!

Deb :))
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
Suggested Courses

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question